{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T01:14:56Z","timestamp":1776820496479,"version":"3.51.2"},"reference-count":67,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T00:00:00Z","timestamp":1694995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["INTR"],"published-print":{"date-parts":[[2024,3,19]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>The advancement of enterprise social networks (ESNs) facilitates information sharing but also presents the challenge of managing information boundaries. This study aims to explore the factors that influence the information-control behavior of ESN users when continuously sharing information.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>This study specifies the information-control behaviors in the \u201cwall posts\u201d channel and applies communication privacy management (CPM) theory to analyze the effects of the individual-specific factor (disposition to value information), context-specific factors (work-relatedness and information richness) and risk-benefit ratio (public benefit and public risk). Data on actual information-control behaviors extracted from ESN logs are examined using multilevel mixed-effects logistic regression analysis.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>The study's findings show the direct effects of the individual-specific factor, context-specific factors and risk-benefit ratio, highlighting interactions between the individual motivation factor and ESN context factors.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>This study reshapes the relationship of CPM theory boundary rules in the ESN context, extending information-control research and providing insights into ESNs' information-control practices.<\/jats:p><\/jats:sec>","DOI":"10.1108\/intr-09-2022-0745","type":"journal-article","created":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T02:56:43Z","timestamp":1694746603000},"page":"610-630","source":"Crossref","is-referenced-by-count":7,"title":["Public information sharing in\u00a0enterprise social networks: a\u00a0communication privacy management perspective"],"prefix":"10.1108","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4282-1993","authenticated-orcid":false,"given":"Yu","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4202-8074","authenticated-orcid":false,"given":"Daqing","family":"Zheng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7595-5261","authenticated-orcid":false,"given":"Yulin","family":"Fang","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2023,9,18]]},"reference":[{"key":"key2024031721514231800_ref001","doi-asserted-by":"crossref","unstructured":"Acquisti, A. and Grossklags, J. (2004), \u201cPrivacy attitudes and privacy behavior\u201d, Camp, L.J. and Lewis, S. (Ed. s), Economics of Information Security, Advances in Information Security, Springer, Boston, MA, pp.\u00a0165-178.","DOI":"10.1007\/1-4020-8090-5_13"},{"key":"key2024031721514231800_ref002","doi-asserted-by":"crossref","unstructured":"Acquisti, A. and Grossklags, J. (2007), \u201cWhat can behavioral economics teach us about privacy?\u201d, Acquisti, A., Gritzalis, S., Lambrinoudakis, C. and di Vimercati, S. (Ed.s), Digital Privacy, Auerbach Publications, New York, pp.\u00a0363-377.","DOI":"10.1201\/9781420052183.ch18"},{"issue":"3","key":"key2024031721514231800_ref003","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1287\/isre.1100.0335","article-title":"The digitization of healthcare: boundary risks, emotion, and consumer willingness to disclose personal health information","volume":"22","year":"2011","journal-title":"Information Systems Research"},{"issue":"4","key":"key2024031721514231800_ref004","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1108\/09593841211278785","article-title":"Dimensions of employee privacy: an empirical study","volume":"25","year":"2012","journal-title":"Information Technology and People"},{"issue":"1","key":"key2024031721514231800_ref005","first-page":"583","article-title":"Interaction effects in econometrics","volume":"45","year":"2012","journal-title":"Empirical Economics"},{"issue":"7","key":"key2024031721514231800_ref006","doi-asserted-by":"crossref","first-page":"1038","DOI":"10.1016\/j.tele.2017.04.013","article-title":"The privacy paradox \u2013 investigating discrepancies between expressed privacy concerns and actual online behavior \u2013 a systematic literature review","volume":"34","year":"2017","journal-title":"Telematics and Informatics"},{"issue":"4","key":"key2024031721514231800_ref007","first-page":"159","article-title":"Information technology competence of business managers: a definition and research model","volume":"17","year":"2015","journal-title":"Journal of Management Information Systems"},{"issue":"2","key":"key2024031721514231800_ref008","doi-asserted-by":"crossref","first-page":"510","DOI":"10.1287\/isre.2019.0900","article-title":"A theory of multilevel information privacy management for the digital era","volume":"31","year":"2020","journal-title":"Information Systems Research"},{"issue":"3","key":"key2024031721514231800_ref009","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1002\/(SICI)1522-7138(199722)11:3<44::AID-DIR7>3.0.CO;2-X","article-title":"Relationship marketing in consumer markets: a comparison of managerial and consumer attitudes about information privacy","volume":"11","year":"1997","journal-title":"Journal of Direct Marketing"},{"issue":"10","key":"key2024031721514231800_ref010","doi-asserted-by":"crossref","first-page":"1392","DOI":"10.1177\/0002764218792691","article-title":"Revisiting the privacy paradox on social media with an extended privacy calculus model: the effect of privacy concerns, privacy self-efficacy, and social capital on privacy management","volume":"62","year":"2018","journal-title":"American Behavioral Scientist"},{"issue":"6","key":"key2024031721514231800_ref011","doi-asserted-by":"crossref","first-page":"690","DOI":"10.1504\/IJMC.2020.110889","article-title":"Understanding location disclosure behaviour via social networks sites: a perspective of communication privacy management theory","volume":"18","year":"2020","journal-title":"International Journal of Mobile Communications"},{"issue":"3","key":"key2024031721514231800_ref012","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1089\/cpb.2008.0226","article-title":"Information disclosure and control on Facebook: are they two sides of the same coin or two different processes?","volume":"12","year":"2009","journal-title":"CyberPsychology and Behavior"},{"issue":"4","key":"key2024031721514231800_ref013","doi-asserted-by":"crossref","first-page":"1863","DOI":"10.25300\/MISQ\/2021\/14165","article-title":"Privacy concerns and data sharing in the Internet of Things: mixed methods evidence from connected cars","volume":"45","year":"2021","journal-title":"MIS Quarterly"},{"issue":"5","key":"key2024031721514231800_ref014","doi-asserted-by":"crossref","first-page":"554","DOI":"10.1287\/mnsc.32.5.554","article-title":"Organizational information requirements, media richness and structural design","volume":"32","year":"1986","journal-title":"Management Science"},{"issue":"1","key":"key2024031721514231800_ref015","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1287\/isre.1060.0080","article-title":"An extended privacy calculus model for E-Commerce transactions","volume":"17","year":"2006","journal-title":"Information Systems Research"},{"issue":"5","key":"key2024031721514231800_ref016","doi-asserted-by":"crossref","first-page":"1725","DOI":"10.1108\/INTR-03-2021-0160","article-title":"Exploring privacy paradox in contact tracing apps adoption","volume":"32","year":"2022","journal-title":"Internet Research"},{"key":"key2024031721514231800_ref017","doi-asserted-by":"crossref","unstructured":"Ellison, N.B., Vitak, J., Steinfield, C., Gray, R. and Lampe, C. (2011), \u201cNegotiating privacy concerns and social capital needs in a Social Media environment\u201d, Trepte, S. and Reinecke, L. (Ed. s), Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web, Springer, Berlin Heidelberg, pp.\u00a019-32.","DOI":"10.1007\/978-3-642-21521-6_3"},{"key":"key2024031721514231800_ref018","volume-title":"38 Million Records Exposed, Microsoft Power Apps Blamed","year":"2021"},{"key":"key2024031721514231800_ref019","first-page":"567","article-title":"What (or who) is public? Privacy settings and social media content sharing","year":"2017"},{"issue":"3","key":"key2024031721514231800_ref020","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1111\/isj.12156","article-title":"Multiple social media in the workplace: contradictions and congruencies","volume":"28","year":"2018","journal-title":"Information Systems Journal"},{"issue":"3","key":"key2024031721514231800_ref021","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1080\/03637751.2017.1332418","article-title":"Distinguishing technologies for social interaction: the perceived social affordances of communication channels scale","volume":"84","year":"2017","journal-title":"Communication Monographs"},{"key":"key2024031721514231800_ref022","first-page":"31","volume-title":"Privacy Controls, Introduction to Social Media Investigation","year":"2015"},{"key":"key2024031721514231800_ref023","volume-title":"Top 20 Enterprise Social Media Management Tools 2023","year":"2023"},{"key":"key2024031721514231800_ref024","first-page":"1","article-title":"Impact of contextual factors on Snapchat public sharing","year":"2019"},{"issue":"2012","key":"key2024031721514231800_ref025","first-page":"1","article-title":"Why most Facebook users get more than they give","volume":"3","year":"2012","journal-title":"Pew Internet and American Life Project"},{"key":"key2024031721514231800_ref026","first-page":"15","year":"2020"},{"key":"key2024031721514231800_ref027","volume-title":"Culture's Consequences: Comparing Values, Behaviors, Institutions and Organizations across Nations","year":"2001"},{"issue":"2","key":"key2024031721514231800_ref028","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1080\/07421222.2017.1334467","article-title":"Beyond the personalization\u2013privacy paradox: privacy valuation, transparency features, and service personalization","volume":"34","year":"2017","journal-title":"Journal of Management Information Systems"},{"key":"key2024031721514231800_ref029","article-title":"Rethinking the privacy calculus: on the role of dispositional factors and affect","year":"2013"},{"key":"key2024031721514231800_ref030","article-title":"Privacy fatigue: the effect of privacy control complexity on consumer electronic information disclosure","year":"2014"},{"key":"key2024031721514231800_ref031","doi-asserted-by":"crossref","unstructured":"Kr\u00e4mer, N.C. and Haferkamp, N. (2011), \u201cOnline self-presentation: balancing privacy concerns and impression construction on social networking Sites\u201d, Trepte, S. and Reinecke, L. (Ed. s), Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web, Springer, Berlin Heidelberg, pp.\u00a0127-141.","DOI":"10.1007\/978-3-642-21521-6_10"},{"issue":"2","key":"key2024031721514231800_ref032","doi-asserted-by":"crossref","first-page":"642","DOI":"10.1108\/ITP-04-2019-0186","article-title":"Enablers of and constraints on employees' information sharing on enterprise social media","volume":"34","year":"2020","journal-title":"Information Technology and People"},{"issue":"3","key":"key2024031721514231800_ref033","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1111\/j.1540-4560.1977.tb01880.x","article-title":"Privacy as a concept and a social issue: a multidimensional developmental theory","volume":"33","year":"1977","journal-title":"Journal of Social Issues"},{"issue":"3","key":"key2024031721514231800_ref034","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1111\/ntwe.12147","article-title":"Social media affordances in entry\u2010level employees' socialization: employee agency in the management of their professional impressions and vulnerability during early stages of socialization","volume":"34","year":"2019","journal-title":"New Technology, Work and Employment"},{"issue":"4","key":"key2024031721514231800_ref035","doi-asserted-by":"crossref","first-page":"747","DOI":"10.25300\/MISQ\/2015\/39.4.1","article-title":"Ambient awareness and knowledge acquisition: using social media to learn who knows what and who knows whom","volume":"39","year":"2015","journal-title":"MIS Quarterly"},{"issue":"1","key":"key2024031721514231800_ref036","first-page":"102","article-title":"Voluntary sharing and mandatory provision: private information disclosure on social networking sites","volume":"57","year":"2020","journal-title":"Information Processing and Management"},{"issue":"4","key":"key2024031721514231800_ref037","first-page":"434","article-title":"Beyond information: the role of territory in privacy management behavior on Social Networking Sites","volume":"20","year":"2019","journal-title":"Journal of the Association for Information Systems"},{"key":"key2024031721514231800_ref038","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1016\/j.chb.2017.04.053","article-title":"Publicness and directedness: effects of social media affordances on attributions and social perceptions","volume":"75","year":"2017","journal-title":"Computers in Human Behavior"},{"issue":"8","key":"key2024031721514231800_ref039","doi-asserted-by":"crossref","first-page":"1005","DOI":"10.1016\/j.im.2018.05.006","article-title":"How to regulate individuals' privacy boundaries on social network sites: a cross-cultural comparison","volume":"55","year":"2018","journal-title":"Information and Management"},{"issue":"2","key":"key2024031721514231800_ref040","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1108\/AJIM-08-2016-0128","article-title":"Discovery of repost patterns by topic analysis in enterprise social networking","volume":"69","year":"2017","journal-title":"Aslib Journal of Information Management"},{"issue":"4","key":"key2024031721514231800_ref041","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1287\/isre.1040.0032","article-title":"Internet users' information privacy concerns (IUIPC): the construct, the scale, and a causal model","volume":"15","year":"2004","journal-title":"Information Systems Research"},{"issue":"4","key":"key2024031721514231800_ref042","doi-asserted-by":"crossref","first-page":"839","DOI":"10.1002\/asi.23206","article-title":"How are people enticed to disclose personal information despite privacy concerns in social network sites? The calculus between benefit and cost","volume":"66","year":"2015","journal-title":"Journal of the Association for Information Science and Technology"},{"issue":"4","key":"key2024031721514231800_ref043","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1111\/j.1468-2885.1991.tb00023.x","article-title":"Communication boundary management: a theoretical model of managing disclosure of private information between marital couples","volume":"1","year":"1991","journal-title":"Communication Theory"},{"key":"key2024031721514231800_ref044","volume-title":"Boundaries of Privacy: Dialectics of Disclosure","year":"2002"},{"key":"key2024031721514231800_ref045","volume-title":"Communication Privacy Management Theory","year":"2015"},{"issue":"2","key":"key2024031721514231800_ref046","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1287\/isre.2019.0885","article-title":"Does identity disclosure help or hurt user content generation? Social presence, inhibition, and displacement effects","volume":"31","year":"2020","journal-title":"Information Systems Research"},{"issue":"3","key":"key2024031721514231800_ref047","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1287\/isre.1070.0133","article-title":"IS application capabilities and relational value in interfirm partnerships","volume":"18","year":"2007","journal-title":"Information Systems Research"},{"issue":"2","key":"key2024031721514231800_ref048","doi-asserted-by":"publisher","first-page":"e03298","DOI":"10.1016\/j.heliyon.2020.e03298","article-title":"Selectivity in posting on social networks: the role of privacy concerns, social capital, and technical literacy","volume":"6","year":"2020","journal-title":"Heliyon"},{"issue":"3","key":"key2024031721514231800_ref049","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1177\/0893318917692896","article-title":"To reveal or conceal: using communication privacy management theory to understand disclosures in the workplace","volume":"31","year":"2017","journal-title":"Management Communication Quarterly"},{"issue":"4","key":"key2024031721514231800_ref050","doi-asserted-by":"crossref","first-page":"989","DOI":"10.2307\/41409970","article-title":"Information privacy research: an interdisciplinary review","volume":"35","year":"2011","journal-title":"MIS Quarterly"},{"issue":"2","key":"key2024031721514231800_ref051","first-page":"7","article-title":"Silent listeners: the evolution of privacy and disclosure on Facebook","volume":"4","year":"2013","journal-title":"Journal of Privacy and Confidentiality"},{"issue":"5","key":"key2024031721514231800_ref052","doi-asserted-by":"publisher","first-page":"102359","DOI":"10.1016\/j.ijinfomgt.2021.102359","article-title":"Impression management strategies on enterprise social media platforms: an affordance perspective","volume":"60","year":"2021","journal-title":"International Journal of Information Management"},{"issue":"6","key":"key2024031721514231800_ref053","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1093\/iwc\/iwt058","article-title":"Online disclosure of personally identifiable information with strangers: effects of public and private sharing","volume":"26","year":"2014","journal-title":"Interacting with Computers"},{"key":"key2024031721514231800_ref054","first-page":"555","article-title":"Why won\u2019t you be my Facebook friend? Strategies for managing context collapse in the workplace","year":"2012"},{"key":"key2024031721514231800_ref055","first-page":"1","article-title":"More than a click: exploring college students' decision-making processes in online news sharing","year":"2020"},{"issue":"1","key":"key2024031721514231800_ref056","first-page":"256","article-title":"The connotation, characteristics and research trend of enterprise social media","volume":"39","year":"2019","journal-title":"Science and Technology Management Research"},{"issue":"1","key":"key2024031721514231800_ref057","doi-asserted-by":"crossref","first-page":"491","DOI":"10.25300\/MISQ\/2022\/14861","article-title":"Peer privacy concerns: conceptualization and measurement","volume":"46","year":"2022","journal-title":"MIS Quarterly"},{"key":"key2024031721514231800_ref058","first-page":"583","article-title":"Risk-taking as a learning process for shaping teen's online information privacy behaviors","year":"2015"},{"key":"key2024031721514231800_ref059","first-page":"189","article-title":"Location sharing privacy preference","year":"2014"},{"issue":"12","key":"key2024031721514231800_ref060","doi-asserted-by":"crossref","first-page":"798","DOI":"10.17705\/1jais.00281","article-title":"Information privacy concerns: linking individual perceptions with institutional privacy assurances","volume":"12","year":"2011","journal-title":"Journal of the Association for Information Systems"},{"issue":"4","key":"key2024031721514231800_ref061","doi-asserted-by":"crossref","first-page":"1342","DOI":"10.1287\/isre.1120.0416","article-title":"Research note \u2013 effects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: a study of location-based services","volume":"23","year":"2012","journal-title":"Information Systems Research"},{"issue":"4","key":"key2024031721514231800_ref062","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.im.2021.103462","article-title":"Social media use and work efficiency: insights from the theory of communication visibility","volume":"58","year":"2021","journal-title":"Information and Management"},{"issue":"C","key":"key2024031721514231800_ref063","first-page":"517","article-title":"Why and how to use enterprise social media platforms: the employee's perspective","volume":"137","year":"2021","journal-title":"Journal of Business Research"},{"issue":"6","key":"key2024031721514231800_ref064","first-page":"103","article-title":"How social media usage affects employees' job satisfaction and turnover intention: an empirical study in China","volume":"56","year":"2019","journal-title":"Information and Management"},{"issue":"6","key":"key2024031721514231800_ref065","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ipm.2021.102679","article-title":"Linguistic characteristics and the dissemination of misinformation in social media: the moderating effect of information richness","volume":"58","year":"2021","journal-title":"Information Processing and Management"},{"key":"key2024031721514231800_ref066","doi-asserted-by":"publisher","DOI":"10.1007\/s12144-022-04218-0","article-title":"Employee posts on personal social media: the mediation role of work-life conflict on employee engagement","year":"2023","journal-title":"Current Psychology"},{"key":"key2024031721514231800_ref067","volume-title":"Advanced Econometrics and Stata Applications","year":"2014"}],"container-title":["Internet Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/INTR-09-2022-0745\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/INTR-09-2022-0745\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:36:53Z","timestamp":1753393013000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/intr\/article\/34\/2\/610-630\/1215275"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,18]]},"references-count":67,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2023,9,18]]},"published-print":{"date-parts":[[2024,3,19]]}},"alternative-id":["10.1108\/INTR-09-2022-0745"],"URL":"https:\/\/doi.org\/10.1108\/intr-09-2022-0745","relation":{},"ISSN":["1066-2243"],"issn-type":[{"value":"1066-2243","type":"print"}],"subject":[],"published":{"date-parts":[[2023,9,18]]}}}